Crypto 2021 's Accepted papers
Accepted Papers
接收論文
These papers are listed in order of submission.
這些論文按提交順序排列。
-
White Box Traitor Tracing
白盒背叛追蹤Mark Zhandry
Princeton University & NTT Research
普林斯頓大學(xué) & NTT 研究所 -
Revisiting the Security of DbHtS MACs: Beyond-Birthday-Bound in the Multi-User Setting
重新審視 DbHtS MAC 的安全性:在多用戶(hù)環(huán)境下的生日界限之外Yaobin Shen, Lei Wang, Dawu Gu, Jian Weng
Shanghai Jiao Tong Univeristy, Shanghai Jiao Tong University, Jinan University -
Proof-Carrying Data without Succinct Arguments
無(wú)需簡(jiǎn)潔論證的證據(jù)攜帶數(shù)據(jù)Benedikt Bunz, Alessandro Chiesa, William Lin, Pratyush Mishra, Nick Spooner
Benedikt Bunz,Alessandro Chiesa,William Lin,Pratyush Mishra,Nick Spooner
Stanford University, UC Berkeley, Boston University
斯坦福大學(xué),加州大學(xué)伯克利分校,波士頓大學(xué) -
Smoothing Out Binary Linear Codes and Worst-case Sub-exponential Hardness for LPN
平滑二元線(xiàn)性碼和 LPN 的最壞情況次指數(shù)難解性Yu Yu, Jiang Zhang
Shanghai Jiao Tong University, Shanghai Qizhi Institute, and Shanghai Key Laboratory of Privacy-Preserving Computation, State Key Laboratory of Cryptology, China
上海交通大學(xué),上海啟智研究院,上海隱私保護(hù)計(jì)算重點(diǎn)實(shí)驗(yàn)室,中國(guó)密碼學(xué)國(guó)家重點(diǎn)實(shí)驗(yàn)室 -
Pushing the Limits of Valiant's Universal Circuits: Simpler, Tighter and More Compact
突破 Valiant 通用電路的極限:更簡(jiǎn)單、更緊湊、更精煉Hanlin Liu, Yu Yu, Shuoyao Zhao, Jiang Zhang, Wenling Liu, Zhenkai Hu
Shanghai Jiao Tong University, Shanghai Jiao Tong University, Shanghai Qizhi Institute, and Shanghai Key Laboratory of Privacy-Preserving Computation, State Key Laboratory of Cryptology, China
上海交通大學(xué)、上海交通大學(xué)、上海啟智研究院以及上海隱私保護(hù)計(jì)算重點(diǎn)實(shí)驗(yàn)室、中國(guó)密碼學(xué)國(guó)家重點(diǎn)實(shí)驗(yàn)室 -
Sumcheck Arguments and their Applications
Sumcheck 論證及其應(yīng)用Jonathan Bootle, Alessandro Chiesa, Katerina Sotiraki
Jonathan Bootle,Alessandro Chiesa,Katerina Sotiraki
IBM Research Zurich, UC Berkeley
IBM 蘇黎世研究實(shí)驗(yàn)室、加州大學(xué)伯克利分校 -
Secure Wire Shuffling in the Probing Model
在探測(cè)模型中的安全線(xiàn)路混洗Jean-Sebastien Coron, Lorenzo Spignoli
讓-塞巴斯蒂安·科隆,洛倫佐·斯皮諾利
University of Luxembourg
盧森堡大學(xué) -
The Cost to Break SIKE: A Comparative Hardware-Based Analysis with AES and SHA-3
破解 SIKE 的成本:基于硬件的比較分析 AES 和 SHA-3Patrick Longa, Wen Wang, Jakub Szefer
帕特里克·隆加,王文,雅庫(kù)布·塞費(fèi)爾
Microsoft, Yale University
微軟,耶魯大學(xué) -
No Time to Hash:On Super-Efficient Entropy Accumulation
無(wú)暇哈希:超級(jí)高效熵累積Yevgeniy Dodis, Siyao Guo, Noah Stephens-Davidowitz, Zhiye Xie
葉夫根尼·多迪斯,郭思瑤,諾亞·斯蒂芬斯-戴維多維奇,謝志曄
NYU, NYU Shanghai, Cornell University
紐約大學(xué),紐約大學(xué)上海分校,康奈爾大學(xué) -
Asymptotically-Good Arithmetic Secret Sharing over Z/p^{\ell}Z with Strong Multiplication and Its Applications to Efficient MPC
漸近優(yōu)化的算術(shù)秘密共享方案 Z/p^{\ell}Z 及其強(qiáng)乘法特性及其在高效 MPC 中的應(yīng)用Ronald Cramer, Matthieu Rambaud, Chaoping Xing
CWI Amsterdam & Leiden University, Telecom Paris, Institut polytechnique de Paris, Shanghai Jiao Tong University
阿姆斯特丹 CWI & 萊頓大學(xué), 電信巴黎, 巴黎理工學(xué)院, 上海交通大學(xué) -
Fine-grained Secure Attribute-based Encryption
細(xì)粒度安全基于屬性的加密Yuyu Wang, Jiaxin Pan, Yu Chen
University of Electronic Science and Technology of China, NTNU – Norwegian University of Science and Technology, Shandong University
電子科技大學(xué)、挪威科技大學(xué)、山東大學(xué) -
Subquadratic SNARGs in the Random Oracle Model
隨機(jī)預(yù)言模型下的次二次復(fù)雜度 SNARGsAlessandro Chiesa, Eylon Yogev
亞歷山德羅·基夏,伊隆·約格夫
UC Berkeley, Tel Aviv University
加州大學(xué)伯克利分校,特拉維夫大學(xué) -
On the Concurrent Composition of Quantum Zero-Knowledge
量子零知識(shí)并發(fā)組合Prabhanjan Ananth, Kai-Min Chung, Rolando L. La Placa
普拉班賈·阿南特,蔡啟明,羅蘭多·L·拉普拉卡
UCSB, Academia Sinica, Taiwan, MIT
加州大學(xué)圣芭芭拉分校,中國(guó)科學(xué)院,臺(tái)灣,麻省理工學(xué)院 -
Lattice Reduction with Approximate Enumeration Oracles: Practical Algorithms and Concrete Performance
近似枚舉預(yù)言機(jī)的格約簡(jiǎn):實(shí)用算法與具體性能Martin Albrecht, Shi Bai, Jianwei Li, Joe Rowell
馬丁·阿爾布雷希特,石白,李建偉,喬·羅威爾
Royal Holloway, University of London, Florida Atlantic University
倫敦皇家霍洛威大學(xué),佛羅里達(dá)大西洋大學(xué) -
Cryptanalysis of Full LowMC and LowMC-M with Algebraic Techniques
基于代數(shù)技術(shù)的 Full LowMC 和 LowMC-M 的密碼分析Fukang Liu, Takanori Isobe, Willi Meier
劉福剛,井上健,威利·邁爾
East China Normal University; University of Hyogo, University of Hyogo; NICT; PRESTO, FHNW
東華大學(xué);兵庫(kù)大學(xué),兵庫(kù)大學(xué);日本信息通信研究機(jī)構(gòu);PRESTO,F(xiàn)HNW -
Broadcast-Optimal Two Round MPC with an Honest Majority
基于誠(chéng)實(shí)多數(shù)的廣播最優(yōu)兩輪 MPCIvan Damg?rd, Bernardo Magri, Divya Ravi, Luisa Siniscalchi, Sophia Yakoubov
Ivan Damg?rd,Bernardo Magri,Divya Ravi,Luisa Siniscalchi,Sophia Yakoubov
Aarhus University 奧爾堡大學(xué) -
Linear Cryptanalysis of FF3-1 and FEA
FF3-1 和 FEA 的線(xiàn)性密碼分析Tim Beyne
imec-COSIC, ESAT, KU Leuven -
Three Halves Make a Whole? Beating the Half-Gates Lower Bound for Garbled Circuits
一半加一半等于一?擊敗 Garbled Circuits 的半門(mén)限下界Mike Rosulek, Lawrence Roy
邁克·羅蘇萊克,勞倫斯·羅伊
Oregon State University 俄勒岡州立大學(xué) -
Subtractive Sets over Cyclotomic Rings: Limits of Schnorr-like Arguments over Lattices
循環(huán)環(huán)上的減法集:格上類(lèi)似 Schnorr 論證的極限Martin Albrecht, Russell W. F. Lai
馬丁·阿爾布雷希特,羅素·W·F·萊
Royal Holloway, University of London, Chair of Applied Cryptography, Friedrich-Alexander-Universit?t Erlangen-Nürnberg
倫敦大學(xué)皇家霍洛威學(xué)院,應(yīng)用密碼學(xué)主席,弗里德里希-亞歷山大大學(xué)埃爾蘭根-紐倫堡 -
A Black-Box Approach to Post-Quantum Zero-Knowledge in Constant Rounds
一種黑盒方法在常數(shù)輪次中實(shí)現(xiàn)后量子零知識(shí)Nai-Hui Chia, Kai-Min Chung, Takashi Yamakawa
蔡乃輝,鐘凱明,山川隆
University of Maryland, Academia Sinica, NTT Secure Platform Laboratories
馬里蘭大學(xué),中國(guó)科學(xué)院,NTT 安全平臺(tái)實(shí)驗(yàn)室 -
MuSig2: Simple Two-Round Schnorr Multi-Signatures
MuSig2:簡(jiǎn)單的兩輪 Schnorr 多重簽名Jonas Nick, Tim Ruffing, Yannick Seurin
Jonas Nick,Tim Ruffing,Yannick Seurin
Blockstream, ANSSI, France
Blockstream,ANSSI,法國(guó) -
KHAPE: Asymmetric PAKE from Key-Hiding Key Exchange
KHAPE:基于密鑰隱藏密鑰交換的非對(duì)稱(chēng) PAKEStanislaw Jarecki, Hugo Krawczyk, Yanqi Gu
Stanislaw Jarecki,Hugo Krawczyk,Yanqi Gu
UC Irvine, Algorand Foundation
加州大學(xué)歐文分校,Algorand 基金會(huì) -
Does Fiat-Shamir Require a Cryptographic Hash Function?
Fiat-Shamir 是否需要密碼學(xué)哈希函數(shù)?Yilei Chen, Alex Lombardi, Fermi Ma, Willy Quach
陳依蕾,Alex Lombardi,馬費(fèi)米,Quach Willy
Tsinghua University, MIT, Princeton and NTT Research, Northeastern
清華大學(xué),麻省理工學(xué)院,普林斯頓大學(xué)和 NTT 研究所,東北大學(xué) -
Non-Interactive Secure Multiparty Computation for Symmetric Functions, Revisited: More Efficient Constructions and Extensions
對(duì)稱(chēng)函數(shù)的非交互式安全多方計(jì)算:更高效的構(gòu)造與擴(kuò)展Reo Eriguchi, Kazuma Ohara, Shota Yamada, Koji Nuida
The University of Tokyo / AIST, AIST, Kyushu University / AIST
東京大學(xué) / AIST, AIST, 熊本大學(xué) / AIST -
Puncturable Pseudorandom Sets and Private Information Retrieval with Near-Optimal Online Bandwidth and Time
可標(biāo)記偽隨機(jī)集與具有近似最優(yōu)在線(xiàn)帶寬和時(shí)間的私有信息檢索Elaine Shi, Waqar Aqeel, Balakrishnan Chandrasekaran, Bruce Maggs
伊萊恩·石,瓦卡爾·阿基爾,巴拉克里希南·錢(qián)德拉塞卡蘭,布魯斯·麥格斯
CMU, Duke University, Vrije Universiteit Amsterdam, Duke University and Emerald Innovations
卡內(nèi)基梅隆大學(xué),杜克大學(xué),阿姆斯特丹自由大學(xué),杜克大學(xué)和埃默里創(chuàng)新 -
Broadcast Encryption with Size N^{1/3} and More from k-Lin
基于 k-線(xiàn)性廣播加密,大小為 N^{1/3}及更多Hoeteck Wee 何泰克·維
NTT Research and ENS, Paris
NTT Research 和巴黎高等師范學(xué)院 -
On the Round Complexity of Secure Quantum Computation
關(guān)于安全量子計(jì)算輪復(fù)雜度James Bartusek, Andrea Coladangelo, Dakshita Khurana, Fermi Ma
詹姆斯·巴圖塞克,安德烈亞·科拉達(dá)喬洛,達(dá)克希塔·庫(kù)拉納,費(fèi)米·馬
UC Berkeley, University of Illinois Urbana Champaign, Princeton University and NTT Research
加州大學(xué)伯克利分校,伊利諾伊大學(xué)厄巴納-香檳分校,普林斯頓大學(xué)和 NTT Research -
Efficient Information-Theoretic Multi-Party Computation over Non-Commutative Rings
非交換環(huán)上的信息論多方計(jì)算Daniel Escudero, Eduardo Soria-Vazquez
丹尼爾·埃斯庫(kù)德羅,愛(ài)德華多·索里亞-瓦克茲
Aarhus University 奧爾堡大學(xué) -
New Approaches for Quantum Copy-Protection
量子版權(quán)保護(hù)的新方法Scott Aaronson, Jiahui Liu, Qipeng Liu, Mark Zhandry, Ruizhe Zhang
The University of Texas at Austin, Princeton University, Princeton University and NTT Research
德克薩斯大學(xué)奧斯汀分校,普林斯頓大學(xué),普林斯頓大學(xué)和 NTT 研究 -
A Rational Protocol Treatment of 51% Attacks
針對(duì) 51%攻擊的合理協(xié)議處理Yun Lu, Vassilis Zikas, Christian Badertscher
University of Edinburgh, Purdue University, IOHK
愛(ài)丁堡大學(xué),普渡大學(xué),IOHK -
Provable Security Analysis of FIDO2
可證明安全性分析:FIDO2Manuel Barbosa, Alexandra Boldyreva, Shan Chen, Bogdan Warinschi
曼努埃爾·巴爾博薩,亞歷山德拉·博爾達(dá)雷瓦,沈珊,博格丹·瓦林斯基
University of Porto (FCUP) and INESC TEC, Georgia Institute of Technology, TU Darmstadt, University of Bristol & Dfinity
波爾圖大學(xué)(FCUP)和 INESC TEC、佐治亞理工學(xué)院、達(dá)姆施塔特工業(yè)大學(xué)、布里斯托大學(xué)和 Dfinity -
ATLAS: Efficient and Scalable MPC in the Honest Majority Setting
ATLAS:在誠(chéng)實(shí)多數(shù)設(shè)置下的高效可擴(kuò)展 MPCVipul Goyal, Hanjun Li, Rafail Ostrovsky, Antigoni Polychroniadou, Yifan Song
Vipul Goyal,Hanjun Li,Rafail Ostrovsky,Antigoni Polychroniadou,Yifan Song
CMU and NTT Research, University of Washington, UCLA, J.P. Morgan AI Research, Carnegie Mellon University
卡內(nèi)基梅隆大學(xué)和 NTT 研究、華盛頓大學(xué)、加州大學(xué)洛杉磯分校、摩根大通人工智能研究、卡內(nèi)基梅隆大學(xué) -
Witness Authenticating NIZKs and Applications
驗(yàn)證 NIZK 和應(yīng)用程序Hanwen Feng, Qiang Tang
Beihang University, University of Sydney
北京航空航天大學(xué),悉尼大學(xué) -
Meet-in-the-Middle Attacks Revisited: Key-recovery, Collision, and Preimage Attacks
中本聰攻擊再探:密鑰恢復(fù)、碰撞和原像攻擊Xiaoyang Dong, Jialiang Hua, Siwei Sun, Zheng Li, Xiaoyun Wang, Lei Hu
Institute for Advanced Study, BNRist, Tsinghua University, Beijing, China, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China, Beijing University of Technology, Beijing, China, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China
高等研究院,BNRist,清華大學(xué),中國(guó)北京,信息安全國(guó)家重點(diǎn)實(shí)驗(yàn)室,中國(guó)科學(xué)院信息工程研究所,北京 100093,中國(guó),北京工業(yè)大學(xué),中國(guó)北京,信息安全國(guó)家重點(diǎn)實(shí)驗(yàn)室,中國(guó)科學(xué)院信息工程研究所,中國(guó)北京 -
Compressing Proofs of k-Out-Of-n Partial Knowledge
壓縮 k-out-of-n 部分知識(shí)的證明Thomas Attema, Ronald Cramer, Serge Fehr
托馬斯·阿特瑪,羅納德·克萊默,塞爾日·費(fèi)爾
CWI & TNO, CWI & Leiden University
CWI & TNO,CWI & 萊頓大學(xué) -
A Logarithmic Lower Bound for Oblivious RAM (for all parameters)
對(duì) Oblivious RAM 的對(duì)數(shù)下界(對(duì)所有參數(shù))Ilan Komargodski, Wei-Kai Lin
Hebrew University and NTT Research, Cornell University
希伯來(lái)大學(xué)和 NTT 研究,康奈爾大學(xué) -
One-Way Functions Imply Secure Computation in a Quantum World
單向函數(shù)意味著在量子世界中實(shí)現(xiàn)安全計(jì)算James Bartusek, Andrea Coladangelo, Dakshita Khurana, Fermi Ma
詹姆斯·巴圖塞克,安德烈亞·科拉達(dá)喬洛,達(dá)克希塔·庫(kù)拉納,費(fèi)米·馬
UC Berkeley, UIUC, Princeton University and NTT Research
加州大學(xué)伯克利分校、伊利諾伊大學(xué)厄巴納-香檳分校、普林斯頓大學(xué)和 NTT 研究所 -
Receiver-Anonymity in Reradomizable RCCA-Secure Cryptosystems Resolved
在可重隨機(jī) RCCA 安全密碼系統(tǒng)中的接收者匿名性問(wèn)題得到解決Yi Wang, Rongmao Chen, Guomin Yang, Xinyi Huang, Baosheng Wang, Moti Yung
National University of Defense Technology, University of Wollongong, Fujian Normal University, Columbia University
國(guó)防科技大學(xué)、伍倫貢大學(xué)、福建師范大學(xué)、哥倫比亞大學(xué) -
Upslices, Downslices, and Secret-Sharing with Complexity of $1.5^n$
子片、降子片和復(fù)雜度為$1.5^n$的密鑰共享Oded Nir, Benny Applebaum
Tel Aviv University 特拉維夫大學(xué) -
Efficient Key Recovery for all HFE Signature Variants
適用于所有 HFE 簽名變體的高效密鑰恢復(fù)Chengdong Tao, Albrecht Petzoldt, Jintai Ding
陶成東, 阿爾布雷希特·佩茨沃爾特, 丁金臺(tái)
Beijing Institute of Mathematical Sciences and Applications, FAU Erlangen-Nuremberg, Yau Mathematical Center, Tsinghua University
北京應(yīng)用數(shù)學(xué)與系統(tǒng)科學(xué)研究所,F(xiàn)AU 埃爾朗根-紐倫堡大學(xué),丘成桐數(shù)學(xué)科學(xué)中心,清華大學(xué) -
On Tight Quantum Security of HMAC and NMAC in the Quantum Random Oracle Model
HMAC 和 NMAC 在量子隨機(jī)預(yù)言模型中的嚴(yán)格量子安全性Akinori Hosoyamada, Tetsu Iwata
NTT Corporation and Nagoya University, Nagoya University
NTT 株式會(huì)社和名古屋大學(xué),名古屋大學(xué) -
Oblivious RAM with Worst-Case Logarithmic Overhead
具有最壞情況對(duì)數(shù)開(kāi)銷(xiāo)的盲存儲(chǔ)器Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, Elaine Shi
Gilad Asharov,Ilan Komargodski,Wei-Kai Lin,Elaine Shi
Bar-Ilan University, Hebrew University and NTT Research, Cornell University, Carnegie Mellon University
巴伊蘭大學(xué),希伯來(lái)大學(xué)和 NTT 研究,康奈爾大學(xué),卡內(nèi)基梅隆大學(xué) -
Multi-Input Quadratic Functional Encryption from Pairings
基于配對(duì)的多輸入二次函數(shù)加密Shweta Agrawal, Rishab Goyal, Junichi Tomida
Shweta Agrawal,Rishab Goyal,Junichi Tomida
IIT Madras, MIT, NTT Secure Platform Labs
印度理工學(xué)院馬德拉斯分校,麻省理工學(xué)院,NTT 安全平臺(tái)實(shí)驗(yàn)室 -
Impossibility of Quantum Virtual Black-Box Obfuscation of Classical Circuits
經(jīng)典電路量子虛擬黑盒混淆的不可能性Gorjan Alagic, Zvika Brakerski, Yfke Dulek, Christian Schaffner
Gorjan Alagic,Zvika Brakerski,Yfke Dulek,Christian Schaffner
QuICS, University of Maryland & National Institute of Standards and Technology, Weizmann Institute of Science, QuSoft & Centrum Wiskunde en Informatica, QuSoft & University of Amsterdam
量子信息與計(jì)算,馬里蘭大學(xué) & 美國(guó)國(guó)家標(biāo)準(zhǔn)與技術(shù)研究院,魏茨曼科學(xué)研究所,QuSoft & 荷蘭數(shù)學(xué)與信息學(xué)中心,QuSoft & 阿姆斯特丹大學(xué) -
Non-Malleable Codes for Bounded Parallel-Time Tampering
非可塑性代碼用于有界并行時(shí)間篡改Dana Dachman-Soled, Ilan Komargodski, Rafael Pass
University of Maryland, Hebrew University and NTT Research, Cornell Tech
馬里蘭大學(xué),希伯來(lái)大學(xué)和 NTT 研究,康奈爾科技 -
Quantum Collision Attacks on Reduced SHA-256 and SHA-512
針對(duì)縮減版 SHA-256 和 SHA-512 的量子碰撞攻擊Akinori Hosoyamada, Yu Sasaki
NTT Corporation and Nagoya University, NTT Corporation -
MoSS: Modular Security Specifications Framework
MoSS: 模塊化安全規(guī)范框架Amir Herzberg, Hemi Leibowitz, Ewa Syta, Sara Wr′otniak
Amir Herzberg, Hemi Leibowitz, Ewa Syta, Sara Wrótniak
Dept. of Computer Science and Engineering, University of Connecticut, Storrs, CT, Dept. of Computer Science, Bar-Ilan University, Ramat Gan, Israel, Dept. of Computer Science, Trinity College, Hartford, CT
計(jì)算機(jī)科學(xué)與工程學(xué)院,康涅狄格大學(xué),斯托爾斯,CT,計(jì)算機(jī)科學(xué)系,巴伊蘭大學(xué),拉馬特甘,以色列,計(jì)算機(jī)科學(xué)系,三一學(xué)院,哈特福德,CT -
Secure Computation from One-Way Noisy Communication, or: Anti-Correlation via Anti-Concentration
單向噪聲通信的安全計(jì)算,或:通過(guò)反集中實(shí)現(xiàn)反相關(guān)性Shweta Agrawal, Yuval Ishai, Eyal Kushilevitz, Varun Narayanan, Manoj Prabhakaran, Vinod M. Prabhakaran, Alon Rosen
Shweta Agrawal,Yuval Ishai,Eyal Kushilevitz,Varun Narayanan,Manoj Prabhakaran,Vinod M. Prabhakaran,Alon Rosen
Indian Institute of Technology Madras, India, Technion, Israel, Tata Institute of Fundamental Research, Mumbai, India, Indian Institute of Technology Bombay, India, IDC Herzliya, Israel
印度理工學(xué)院馬德拉斯分校,印度,以色列理工學(xué)院,以色列,塔塔基礎(chǔ)研究所,孟買(mǎi),印度,印度理工學(xué)院孟買(mǎi)分校,印度,IDC 赫茲利亞學(xué)院,以色列 -
DualRing: Generic Construction of Ring Signatures with Efficient Instantiations
DualRing:具有高效實(shí)例的環(huán)簽名通用構(gòu)造Tsz Hon Yuen, Muhammed F. Esgin, Joseph K. Liu, Man Ho Au, Zhimin Ding
Tsz Hon Yuen,Muhammed F. Esgin,Joseph K. Liu,Man Ho Au,Zhimin Ding
The University of Hong Kong, Monash University and CSIRO's Data61, Monash University, Rice University
香港大學(xué)、莫納什大學(xué)和澳大利亞聯(lián)邦科學(xué)工業(yè)研究組織(CSIRO)的數(shù)據(jù) 61 實(shí)驗(yàn)室、莫納什大學(xué)、 Rice 大學(xué) -
Towards Tight Random Probing Security
邁向緊密隨機(jī)探測(cè)安全Ga?tan Cassiers, Sebastian Faust, Maximilian Orlt, Fran?ois-Xavier Standaert
UCLouvain, Belgium, University of Darmstadt, Germany
比利時(shí)魯汶大學(xué), 德國(guó)達(dá)姆施塔特大學(xué) -
A New Simple Technique to Bootstrap Various Lattice Zero-Knowledge Proofs to QROM Secure NIZKs
一種新的簡(jiǎn)單技術(shù),用于將各種格零知識(shí)證明引導(dǎo)至 QROM 安全 NIZKsShuichi Katsumata
AIST, Japan 日本 AIST -
Traceable Secret Sharing and Applications
可追溯秘密共享及其應(yīng)用Vipul Goyal, Yifan Song, Akshayaram Srinivasan
CMU and NTT Research, CMU, Tata Institute of Fundamental Research
卡內(nèi)基梅隆大學(xué)和日本電氣通信研究所研究,卡內(nèi)基梅隆大學(xué),塔塔基礎(chǔ)研究所 -
Three-Round Secure Multiparty Computation from Black-Box Two-Round Oblivious Transfer
基于黑盒兩輪盲傳遞的三輪安全多方計(jì)算Arpita Patra, Akshayaram Srinivasan
阿普里塔·帕特拉,阿克沙亞拉姆·斯里尼瓦桑
Indian Institute of Science, Tata Institute of Fundamental Research
印度科學(xué)學(xué)院,塔塔基礎(chǔ)研究所 -
Lower bounds on lattice sieving and information set decoding
格點(diǎn)篩分和信息集解碼的下界Thijs Laarhoven, Elena Kirshanova
Eindhoven University of Technology, Immanuel Kant Baltic Federal University
埃因霍溫理工大學(xué),伊曼努爾·康特波羅的海聯(lián)邦大學(xué) -
Separating Adaptive Streaming from Oblivious Streaming using the Bounded Storage Model
使用有界存儲(chǔ)模型分離自適應(yīng)流媒體與盲目流媒體Haim Kaplan, Yishay Mansour, Kobbi Nissim, Uri Stemmer
海姆·卡普蘭,伊沙伊·曼蘇爾,科比·尼斯姆,烏里·斯特默
Tel Aviv University, Georgetown University, Ben-Gurion University
特拉維夫大學(xué),喬治城大學(xué),本-古里翁大學(xué) -
On the Round Complexity of Black-Box Secure MPC
黑盒安全 MPC 的輪復(fù)雜度研究Yuval Ishai, Dakshita Khurana, Amit Sahai, Akshayaram Srinivasan
尤瓦爾·伊沙伊,達(dá)克希塔·庫(kù)拉納,阿米特·薩海,阿克沙亞拉姆·斯里尼瓦桑
Technion, UIUC, UCLA, Tata Institute of Fundamental Research
Technion, UIUC, UCLA, 印度塔塔基礎(chǔ)研究所 -
Deniable Fully Homomorphic Encryption from Learning With Errors
基于誤差學(xué)習(xí)的不否認(rèn)全同態(tài)加密Shweta Agrawal, Shafi Goldwasser, Saleet Mossel
IIT Madras, Simons Institute of TOC, MIT
麻省理工學(xué)院,IIT Madras,西蒙斯圖靈理論研究所 -
Round Efficient Secure Multiparty Quantum Computation with Identifiable Abort
高效安全多方量子計(jì)算與可識(shí)別中止Bar Alon, Hao Chung, Kai-Min Chung, Mi-Ying Huang, Yi Lee, Yu-Ching Shen
Ariel University, Carnegie Mellon University, Academia Sinica
阿利爾大學(xué),卡內(nèi)基梅隆大學(xué),中國(guó)科學(xué)院 -
How to Meet Ternary LWE Keys
如何滿(mǎn)足三元 LWE 密鑰Alexander May 亞歷山大·梅
Ruhr University Bochum 魯爾大學(xué)波鴻 -
You Only Speak Once: Secure MPC with Stateless Ephemeral Roles
一次只說(shuō)一次:具有無(wú)狀態(tài)臨時(shí)角色的安全 MPCCraig Gentry, Shai Halevi, Hugo Krawczyk, Bernardo Magri, Jesper Buus Nielsen, Tal Rabin, Sophia Yakoubov
克雷格·杰尼、沙伊·哈萊維、雨果·克拉夫茨基、伯納多·馬格里、耶普·布斯·尼爾森、塔爾·拉賓、索菲亞·亞庫(kù)博夫
Algorand Foundation, Concordium Blockchain Research Center, Aarhus University, UPenn and Algorand Foundation, Aarhus University
Algorand 基金會(huì)、Concordium 區(qū)塊鏈研究中心、奧胡斯大學(xué)、賓夕法尼亞大學(xué)和 Algorand 基金會(huì)、奧胡斯大學(xué) -
Composition with Knowledge Assumptions
基于知識(shí)假設(shè)的組合Thomas Kerber, Aggelos Kiayias, Markulf Kohlweiss
托馬斯·克伯,阿格洛斯·基亞亞斯,馬克爾夫·科爾韋斯
The University of Edinburgh & IOHK
愛(ài)丁堡大學(xué) & IOHK -
Oblivious Key-Value Stores and Amplification for Private Set Intersection
盲點(diǎn)鍵值存儲(chǔ)和放大用于私有集合交集Gayathri Garimella, Benny Pinkas, Mike Rosulek, Ni Trieu, Avishay Yanai
蓋亞特里·加里梅拉,本尼迪克特·平卡斯,邁克·羅蘇萊克,尼·崔,阿維沙伊·亞奈
Oregon State University, Bar-Ilan University, Arizona State University, VMware
俄勒岡州立大學(xué),巴伊蘭大學(xué),亞利桑那州立大學(xué),VMware -
Game-Theoretic Fairness Meets Multi-Party Protocols: The Case of Leader Election
博弈論公平性與多方協(xié)議的交匯:領(lǐng)導(dǎo)者選舉的案例Kai-Min Chung, T-H. Hubert Chan, Ting Wen, Elaine Shi
鐘凱明,陳泰和,文婷,石艾琳
Academia Sinica, HKU, CMU
中國(guó)科學(xué)院,香港大學(xué),卡內(nèi)基梅隆大學(xué) -
Functional Encryption for Turing Machines with Dynamic Bounded Collusion from LWE
基于 LWE 的動(dòng)態(tài)有界串謀圖靈機(jī)功能加密Shweta Agrawal, Shota Yamada, Monosij Maitra, Narasimha Sai Vempati
Shweta Agrawal,Shota Yamada,Monosij Maitra,Narasimha Sai Vempati
IIT Madras, AIST Japan, TU Darmstadt
印度理工學(xué)院馬德拉斯分校,日本產(chǎn)業(yè)技術(shù)綜合研究所,達(dá)姆施塔特工業(yè)大學(xué) -
Adaptive Extractors and their Application to Leakage Resilient Secret Sharing
自適應(yīng)提取器及其在抗泄漏秘密共享中的應(yīng)用Nishanth Chandran, Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar
Microsoft Research, India, Indian Institute of Science, Bangalore
微軟研究院,印度,印度科學(xué)理工學(xué)院,班加羅爾 -
Silver: Silent VOLE and Oblivious Transfer from Hardness of Decoding Structured LDPC Codes
銀:基于解碼結(jié)構(gòu)化 LDPC 碼的困難性的靜默 VOLE 和盲目的傳遞Peter Rindal, Srinivasan Raghuraman, Geoffroy Couteau
彼得·林達(dá)爾,斯里尼瓦瑟·拉格魯拉曼,喬治·庫(kù)托
Visa Research, CNRS, IRIF, Université de Paris
Visa Research,CNRS,IRIF,巴黎大學(xué) -
Hidden Cosets and Applications to Unclonable Cryptography
隱藏陪集及其在不可克隆密碼學(xué)中的應(yīng)用Andrea Coladangelo, Jiahui Liu, Qipeng Liu, Mark Zhandry
安德里亞·科拉達(dá)切洛, 劉佳輝, 劉啟鵬, 馬克·贊德里
University of California, Berkeley, The University of Texas at Austin, Princeton University, Princeton University and NTT Research
加州大學(xué)伯克利分校, 德克薩斯大學(xué)奧斯汀分校, 普林斯頓大學(xué), 普林斯頓大學(xué)和 NTT 研究 -
Improved Computational Extractors and their Applications
改進(jìn)的計(jì)算提取器及其應(yīng)用Dakshita Khurana, Akshayaram Srinivasan
達(dá)克西塔·庫(kù)拉納, 阿克沙亞拉姆·斯里尼瓦桑
UIUC, Tata Institute of Fundamental Research
伊利諾伊大學(xué)厄巴納-香檳分校,塔塔基礎(chǔ)研究所 -
Towards faster polynomial-time lattice reduction
朝向更快的多項(xiàng)式時(shí)間格約化Paul Kirchner, Thomas Espitau, Pierre-Alain Fouque
University Rennes, NTT Research and Development
雷恩大學(xué),NTT 研發(fā) -
Fluid MPC: Secure Multiparty Computation with Dynamic Participants
流體 MPC:具有動(dòng)態(tài)參與者的安全多方計(jì)算Arka Rai Choudhuri, Aarushi Goel, Matthew Green, Abhishek Jain, Gabriel Kaptchuk
阿卡·拉伊·喬杜里,阿魯希·高爾,馬修·格林,阿比希克·賈恩,加布里埃爾·卡普楚克
Johns Hopkins University, Boston University
約翰霍普金斯大學(xué),波士頓大學(xué) -
Halo Infinite: Proof-Carrying Data from Additive Polynomial Commitments
《光環(huán):無(wú)限》:來(lái)自加性多項(xiàng)式承諾的證明攜帶數(shù)據(jù)Ben Fisch, Dan Boneh, Ariel Gabizon, Justin Drake
本·費(fèi)什,丹·波納赫,阿利爾·加比茲翁,賈斯汀·德雷克
Stanford University, Aztec, Ethereum Foundation
斯坦福大學(xué),Aztec,以太坊基金會(huì) -
Non-Interactive Batch Arguments for NP from Standard Assumptions
基于標(biāo)準(zhǔn)假設(shè)的 NP 非交互批量論證Arka Rai Choudhuri, Abhishek Jain, Zhengzhong Jin
Johns Hopkins University
約翰霍普金斯大學(xué) -
Computational Hardness of Optimal Fair Computation: Beyond Minicrypt
最優(yōu)公平計(jì)算的計(jì)算難度:超越 MinicryptHemanta K. Maji, Mingyuan Wang
Purdue University 普渡大學(xué) -
Tight State-Restoration Soundness in the Algebraic Group Model
代數(shù)群模型中的嚴(yán)格狀態(tài)恢復(fù)安全性Ashrujit Ghoshal, Stefano Tessaro
University of Washington
華盛頓大學(xué) -
Thinking Outside the Superbox
跳出超級(jí)盒子思考Dani?l Kuijsters, Gilles Van Assche, Nicolas Bordes, Joan Daemen
丹尼爾·庫(kù)伊斯特斯,吉勒斯·范阿斯切,尼古拉斯·博爾代,瓊·達(dá)門(mén)
Radboud University, STMicroelectronics, Université Grenoble Alpes
魯汶大學(xué),意法半導(dǎo)體,格勒諾布爾阿爾卑斯大學(xué) -
Counterexamples to Circular Security-Based iO
基于循環(huán)安全性的 iO 反例Sam Hopkins, Aayush Jain, Huijia Lin
薩姆·霍普金斯,阿尤什·賈因,林慧嘉
UC Berkeley, UCLA, UW
加州大學(xué)伯克利分校,加州大學(xué)洛杉磯分校,華盛頓大學(xué) -
Targeted Lossy Functions and Applications
面向目標(biāo)的失真函數(shù)和應(yīng)用Willy Quach, Brent Waters, Daniel Wichs
Willy Quach,Brent Waters,Daniel Wichs
Northeastern University, University of Texas at Austin and NTT Research
東北大學(xué),德克薩斯大學(xué)奧斯汀分校和 NTT Research -
Tighter Security for Schnorr Identification and Signatures: A High-Moment Forking Lemma for ${\Sigma}$-Protocols
Schnorr 身份識(shí)別和簽名更嚴(yán)格的安全性:適用于 ${\Sigma}$-協(xié)議的高階分叉引理Lior Rotem, Gil Segev
利奧·羅滕,吉爾·塞格夫
The Hebrew University 希伯來(lái)大學(xué) -
On the Possibility of Basing Cryptography on $\EXP \neq \BPP$
基于 $\EXP \neq \BPP$ 的密碼學(xué)可能性Yanyi Liu, Rafael Pass
Yanyi Liu,Rafael Pass
Cornell University, Cornell Tech
康奈爾大學(xué),康奈爾科技 -
Mac'n'Cheese: Zero-Knowledge Proofs for Boolean and Arithmetic Circuits with Nested Disjunctions
Mac'n'Cheese:具有嵌套合取的布爾和算術(shù)電路的零知識(shí)證明Carsten Baum, Alex J. Malozemoff, Marc B. Rosen, Peter Scholl
Carsten Baum,Alex J. Malozemoff,Marc B. Rosen,Peter Scholl
Aarhus University, Galois, Inc.
阿魯姆大學(xué),Galois 公司 -
Quadratic Secret Sharing and Conditional Disclosure of Secrets
二次秘密共享與秘密的條件披露Amos Beimel, Hussien Othman, Naty Peter
阿莫斯·貝梅爾,侯賽因·奧斯曼,納蒂·彼得
Ben-Gurion University of the Negev, Tel-Aviv University
內(nèi)蓋夫本-古里翁大學(xué),特拉維夫大學(xué) -
Two-Round Trip Schnorr Multi-Signatures via Delinearized Witnesses
基于去線(xiàn)性化證人的兩輪 Schnorr 多重簽名Handan Kilinc Alper, Jeffrey Burdges
韓丹·基林奇·阿爾普,杰弗里·伯德格斯
Web3 Foundation Web3 基金會(huì) -
Constructing Locally Leakage-resilient Linear Secret-sharing Schemes
構(gòu)建本地抗泄露線(xiàn)性秘密共享方案Hemanta K. Maji, Anat Paskin-Cherniavsky, Tom Suad, Mingyuan Wang
Purdue University, Ariel University
普渡大學(xué),阿利爾大學(xué) -
Improved torsion-point attacks on SIDH variants
對(duì) SIDH 變體的改進(jìn)扭曲點(diǎn)攻擊Victoria de Quehen, Peter Kutas, Chris Leonardi, Chloe Martindale, Lorenz Panny, Christophe Petit, Katherine E. Stange
ISARA Corporation, Waterloo, University of Birmingham, University of Bristol, Academia Sinica, Universite libre de Bruxelles and University of Birmingham, University of Colorado Boulder -
Differential-Linear Cryptanalysis from an Algebraic Perspective
從代數(shù)角度進(jìn)行的差分線(xiàn)性密碼分析Meicheng Liu, Xiaojuan Lu, Dongdai Lin
Chinese Academy of Sciences
中國(guó)科學(xué)院 -
Low-Complexity Weak Pseudorandom Functions in AC0[MOD2]
AC0[MOD2]中低復(fù)雜度的弱偽隨機(jī)函數(shù)Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Peter Scholl
IDC Herzliya, CNRS, IRIF, Université de Paris, Ben-Gurion University, Technion, CWI Amsterdam, Aarhus University -
The $t$-wise Independence of Substitution-Permutation Networks
$t$-wise 獨(dú)立性置換網(wǎng)絡(luò)Tianren Liu, Stefano Tessaro, Vinod Vaikuntanathan
劉天仁,斯特凡諾·泰薩羅,維諾德·瓦庫(kù)坦塔南
University of Washington, MIT
華盛頓大學(xué),麻省理工學(xué)院 -
Compact Ring Signatures from Learning With Errors
基于誤差學(xué)習(xí)的緊湊環(huán)簽名Rohit Chatterjee, Sanjam Garg, Mohammad Hajiabadi, Dakshita Khurana, Xiao Liang, Giulio Malavolta, Omkant Pandey, Sina Shiehian
Rohit Chatterjee,Sanjam Garg,Mohammad Hajiabadi,Dakshita Khurana,Xiao Liang,Giulio Malavolta,Omkant Pandey,Sina Shiehian
Stony Brook University, University of California, Berkeley and NTT Research, University of Waterloo, University of Illinois Urbana-Champaign, Max Planck Institute for Security and Privacy, University of California, Berkeley and Stony Brook University
Stony Brook University,University of California, Berkeley and NTT Research,University of Waterloo,University of Illinois Urbana-Champaign,Max Planck Institute for Security and Privacy,University of California, Berkeley and Stony Brook University -
MPC-Friendly Symmetric Cryptography from Alternating Moduli: Candidates, Protocols, and Applications
基于交替模的 MPC 友好型對(duì)稱(chēng)密碼學(xué):候選方案、協(xié)議與應(yīng)用Itai Dinur, Steven Goldfeder, Tzipora Halevi, Yuval Ishai, Mahimna Kelkar, Vivek Sharma, Greg Zaverucha
伊泰·迪努爾,史蒂文·戈?duì)柕沦M(fèi)爾德,齊波拉·哈萊維,尤瓦爾·伊沙伊,馬希姆納·凱爾卡爾,維韋克·夏爾馬,格雷格·澤夫魯查
Ben-Gurion University, Cornell Tech, Brooklyn College, CUNY, Technion, Cornell Tech, Cornell University, Graduate Center, CUNY, Microsoft
本-古里昂大學(xué),康奈爾科技學(xué)院,布魯克林學(xué)院,CUNY,以色列理工學(xué)院,康奈爾科技學(xué)院,康奈爾大學(xué),研究生院,CUNY,微軟 -
MHz2k: MPC from HE over $\mathbb{Z}_{2^k}$ with New Packing, Simpler Reshare, and Better ZKP
MHz2k:基于$\mathbb{Z}_{2^k}$上的 HE 的多方計(jì)算,具有新的打包方法、更簡(jiǎn)單的重新共享和更好的 ZKPJung Hee Cheon, Dongwoo Kim, Keewoo Lee
金惠鎮(zhèn),金東宇,李桂宇
Seoul National University, Western Digital Research, Milpitas
首爾國(guó)立大學(xué),西部數(shù)據(jù)研究,米爾皮塔斯 -
SMILE: Set Membership from Ideal Lattices with Applications to Ring Signatures and Confidential Transactions
SMILE:基于理想格的集合成員關(guān)系及其在環(huán)簽名和機(jī)密交易中的應(yīng)用Vadim Lyubashevsky, Ngoc Khanh Nguyen, Gregor Seiler
瓦季姆·柳巴舍夫斯基,阮玉香,格雷戈?duì)枴べ惱諣?/span>
IBM Research Europe - Zurich, IBM Research Europe - Zurich & ETH Zurich
IBM 歐洲研究中心 - 蘇黎世,IBM 歐洲研究中心 - 蘇黎世 & 蘇黎世聯(lián)邦理工學(xué)院 -
Large Message Homomorphic Secret Sharing from DCR and Applications
基于 DCR 的大消息同態(tài)秘密共享及其應(yīng)用Jaspal Singh, Lawrence Roy
Oregon State University 俄勒岡州立大學(xué) -
Sublinear GMW-Style Compiler for MPC with Preprocessing
具有預(yù)處理功能的 MPC 亞線(xiàn)性 GMW 風(fēng)格編譯器Ariel Nof, Elette Boyle, Yuval Ishai, Niv Gilboa
Technion Israel Institute of Technology, IDC Herzliya, Ben-Gurion University
以色列理工學(xué)院,海法市,本-古里安大學(xué) -
Authenticated Key Exchange and Signatures with Tight Security in the Standard Model
標(biāo)準(zhǔn)模型中具有嚴(yán)格安全性的認(rèn)證密鑰交換和簽名Shuai Han, Tibor Jager, Eike Kiltz, Shengli Liu, Jiaxin Pan, Doreen Riepel, Sven Sch?ge
Shanghai Jiao Tong University, Bergische Universit?t Wuppertal, Ruhr-Universit?t Bochum, NTNU, Norway
上海交通大學(xué),德國(guó)伍珀塔爾大學(xué),波鴻魯爾大學(xué),挪威特羅姆瑟大學(xué) -
Limits on the Adaptive Security of Yao’s Garbling
姚氏混淆的適應(yīng)性安全性的限制Chethan Kamath, Karen Klein, Krzysztof Pietrzak, Daniel Wichs
Chethan Kamath,Karen Klein,Krzysztof Pietrzak,Daniel Wichs
Unaffilated, IST Austria, Northeastern University
非附屬,奧地利國(guó)家科學(xué)研究所,東北大學(xué) -
An Algebraic Framework for Universal and Updatable SNARKs
一個(gè)用于通用和可更新的 SNARKs 的代數(shù)框架Arantxa Zapico, Carla Ràfols
阿蘭查·扎皮科,卡拉·拉福爾斯
Pompeu Fabra University, Pompeu Fabra University and Cybercat
龐培法布拉大學(xué),龐培法布拉大學(xué)和 Cybercat -
Unconditional Communication-Efficient MPC via Hall's Marriage Theorem
基于霍爾婚姻定理的無(wú)條件通信高效 MPCVipul Goyal, Antigoni Polychroniadou, Yifan Song
維普爾·高 oyal,安提戈尼·波利克羅尼亞多,伊凡·宋
CMU and NTT Research, J.P. Morgan AI Research, Carnegie Mellon University
卡內(nèi)基梅隆大學(xué)和 NTT 研究,摩根大通人工智能研究,卡內(nèi)基梅隆大學(xué) -
Time- and Space-Efficient Arguments from Groups of Unknown Order
來(lái)自未知階群的時(shí)空高效論證Alexander Block, Justin Holmgren, Alon Rosen, Ron D. Rothblum, Pratik Soni
亞歷山大·布洛克,賈斯汀·霍姆格林,阿隆·羅森,羅恩·D·羅思布盧姆,普拉蒂克·索尼
Purdue University, NTT Research, IDC Herzliya, Technion, Carnegie Mellon University
普渡大學(xué),NTT 研究,海法 IDC,以色列理工學(xué)院,卡內(nèi)基梅隆大學(xué) -
SSE and SSD: Page-Efficient Searchable Symmetric Encryption
SSE 和 SSD:頁(yè)面高效的搜索型對(duì)稱(chēng)加密Brice Minaud, Raphael Bost, Angele Bossuat, Pierre-Alain Fouque, Michael Reichle
布里斯·米諾、拉斐爾·博斯特、安吉爾·博蘇阿特、皮埃爾-艾倫·富科、邁克爾·萊希勒
INRIA and ENS France, DGA, University Rennes
法國(guó) INRIA 和 ENS、DGA、雷恩大學(xué) -
A Compressed Sigma-Protocol Theory for Lattices
格體壓縮 Sigma 協(xié)議理論Thomas Attema, Ronald Cramer, Lisa Kohl
托馬斯·阿特瑪,羅納德·克萊默,麗莎·科爾
CWI & TNO, CWI & Leiden University, CWI
CWI & TNO,CWI & 鹿特丹大學(xué),CWI -
Towards a Unified Approach to Black-Box Constructions of Zero-Knowledge Proofs
面向零知識(shí)證明黑盒構(gòu)造的統(tǒng)一方法Xiao Liang, Omkant Pandey
李翔,奧坎特·潘迪
Stony Brook University 石溪大學(xué) -
Threshold Schnorr with Stateless Deterministic Signing from Standard Assumptions
基于標(biāo)準(zhǔn)假設(shè)的無(wú)狀態(tài)確定性簽名閾值 Schorr 方案Francois Garillot, Yashvanth Kondi, Payman Mohassel, Valeria Nikolaenko
, Northeastern University, Facebook, Novi/Facebook
, 東北大學(xué), Facebook, Novi/Facebook -
Multi-theorem Designated-Verifier NIZK for QMA
多定理指定驗(yàn)證者 NIZK 對(duì)于 QMAOmri Shmueli
Tel Aviv University 特拉維夫大學(xué)

轉(zhuǎn)載自:https://crypto.iacr.org/2021/acceptedpapers.php
浙公網(wǎng)安備 33010602011771號(hào)